Package: spectre-meltdown-checker
Version: 0.43-3
Severity: normal

Dear Maintainer,

I get two vulnerabilities shown when using spectre-meltdnown-checker for this
Skylake system:

CVE-2018-3640 aka 'Variant 3a, rogue system register read'
* CPU microcode mitigates the vulnerability:  NO 
> STATUS:  VULNERABLE  (an up-to-date CPU microcode is needed to mitigate this 
> vulnerability)

CVE-2018-3615 aka 'Foreshadow (SGX), L1 terminal fault'
* CPU microcode mitigates the vulnerability:  N/A 
> STATUS:  VULNERABLE  (your CPU supports SGX and the microcode is not up to 
> date)

Both indicate that updated CPU micorcode is needed.

However, intel-microcode is installed with version 3.20200616.1 and both
https://security-tracker.debian.org/tracker/CVE-2018-3640
and
https://security-tracker.debian.org/tracker/CVE-2018-3615
indicate that the vulnerability is fixed with version 3.20200616.1 for
bullseye/sid.

There is a lot of fuzz about being quantum-safe, but I do not think that they
refer to being vulnerable and not being vulnerable at the same time. ;-)

So who is right? Is it spectre-meltdown-checker or the security tracker? Or
are really both right and there is some information missing (like that it is
fixed but only with a UEFI/BIOS update)?

Kind regards
Patrick

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'stable'), (500, 'unstable-debug'), (400, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.9.0-1-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de:en_US
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-- no debconf information

Reply via email to